No products in the cart.

Criminal Justice A Brief Introduction 12th International Edition by Frank Schmalleger - Test Bank

Criminal Justice A Brief Introduction 12th International Edition by Frank Schmalleger - Test Bank   Instant Download - Complete Test Bank With Answers     Sample Questions Are Posted Below   Chapter 5—Criminal Justice in the New Millennium: Terrorism, Homeland Security, and Cybercrime   MULTIPLE CHOICE   The term terror was first associated with unrest …

$19.99

Criminal Justice A Brief Introduction 12th International Edition by Frank Schmalleger – Test Bank

 

Instant Download – Complete Test Bank With Answers

 

 

Sample Questions Are Posted Below

 

Chapter 5—Criminal Justice in the New Millennium: Terrorism, Homeland Security, and Cybercrime

 

MULTIPLE CHOICE

 

  1. The term terror was first associated with unrest in _____ in 1917.
a. Iraq
b. Germany
c. Russia
d. Ireland

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 168

OBJ:   2                    TOP:   terrorism

 

  1. A(n) _____ uses criminal and violent acts to influence an audience beyond the immediate target.
a. Terrorist
b. Guerilla
c. Insurgent
d. Revolutionary

 

 

ANS:  A                    PTS:   1                    DIF:    1                    REF:   p. 169

OBJ:   1                    TOP:   defining terrorism

 

  1. A(n) _____ is the term for an irregular military band located in rural areas that attack military, police, and government targets.
a. Terrorist
b. Guerilla
c. Insurgent
d. Revolutionary

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 170

OBJ:   1                    TOP:   defining terrorism

 

  1. Which one of the following is not one of the theoretical explanations for terrorism discussed in the text?
a. Social learning
b. Socialization
c. Alienation
d. Psychological

 

 

ANS:  A                    PTS:   1                    DIF:    1                    REF:   p. 169-170

OBJ:   3                    TOP:   who is the terrorist?

 

  1. _____ terrorists use violence to frighten those in power and their supporters in order to replace the existing government with a regime that holds acceptable political or religious views.
a. Revolutionary
b. Political
c. Nationalist
d. Retributive

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 171

OBJ:   4                    TOP:   the contemporary terrorist

 

  1. _____ terrorists promote the interests of a minority ethnic or religious group that believes it has been persecuted under majority rule and wishes to carve out its own independent homeland.
a. Revolutionary
b. Political
c. Nationalist
d. Retributive

 

 

ANS:  C                    PTS:   1                    DIF:    2                    REF:   p. 171

OBJ:   4                    TOP:   the contemporary terrorist

 

  1. _____ terrorists fight for a cause with people anywhere whose ideology and/or religion they find objectionable.
a. Revolutionary
b. Political
c. Nationalist
d. Retributive

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 171

OBJ:   4                    TOP:   the contemporary terrorist

 

  1. A(n) _____ confronts the existing government for control of all or a portion of its territory, or forces political concessions in sharing political power.
a. Terrorist
b. Guerilla
c. Insurgent
d. Revolutionary

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 170

OBJ:   1                    TOP:   defining terrorism

 

  1. White supremacists are an example of _____ terrorists.
a. Revolutionary
b. Political
c. Nationalist
d. Retributive

 

 

ANS:  B                    PTS:   1                    DIF:    2                    REF:   p. 171

OBJ:   4                    TOP:   the contemporary terrorist

 

  1. In what year did Congress pass legislation authorizing the creation of the Department of Homeland Security?
a. 1998
b. 2000
c. 2002
d. 2004

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 173

OBJ:   5                    TOP:   Homeland Security

 

  1. Less than _____ percent of cargo containers entering the United States every day are screened.
a. 5
b. 10
c. 15
d. 20

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 174

OBJ:   5                    TOP:   terrorism and law enforcement

 

  1. There are approximately 130 nuclear research reactors in _____ countries, with two dozen of these having enough highly enriched uranium for one or more nuclear bombs.
a. twenty
b. thirty
c. forty
d. fifty

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 174

OBJ:   5                    TOP:   terrorism and law enforcement

 

  1. The Department of Homeland Security is responsible for securing our nation’s borders and transportation systems, which include _____ ports of entry.
a. 150
b. 250
c. 350
d. 450

 

 

ANS:  C                    PTS:   1                    DIF:    2                    REF:   p. 174

OBJ:   5                    TOP:   Homeland Security

 

  1. US-VISIT procedures were started in airports in what year?
a. 2000
b. 2002
c. 2004
d. 2006

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 177

OBJ:   5                    TOP:   Homeland Security

 

  1. _____ created the Anti-Terrorism Information Center to divide the states into operational zones, and link federal, state, and local information services in one system to combat terrorism.
a. Alabama
b. California
c. Illinois
d. Texas

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 175

OBJ:   6                    TOP:   state law enforcement

 

  1. Which of the following is an aim of the USA Patriot Act?
a. To give sweeping new powers to domestic law enforcement and international intelligence agencies in an effort to fight terrorism
b. To expand the definition of terrorist activities
c. To alter sanctions for violent terrorism
d. All of these are aims of the USA Patriot Act

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 178

OBJ:   7                    TOP:   confronting terrorism with the law

 

  1. The USA Patriot Act was reauthorized, keeping most of its provisions, in what year?
a. 2002
b. 2004
c. 2006
d. 2008

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 178

OBJ:   7                    TOP:   confronting terrorism with the law

 

  1. Civil libertarians argue that _____ Amendment rights may be violated by the USA Patriot Act.
a. First
b. Fourth
c. Fifth
d. Eighth

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 179

OBJ:   7                    TOP:   civil rights and the war against terrorism

 

  1. Which of the following is false about cybercrime?
a. It is difficult to detect through traditional law enforcement channels.
b. It is rapidly evolving.
c. Its control demands that agents of the justice system develop technical skills.
d. It is relatively easily controlled by law enforcement.

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 183

OBJ:   8                    TOP:   cybercrime

 

  1. _____ is the use of computer networks for undermining the social, economic, and political system of an enemy through the destruction of infrastructure.
a. Cybertheft
b. Cybervandalism
c. Cyberterrorism
d. Cybermovement

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 184

OBJ:   8                    TOP:   cybercrime

 

  1. Spending on IT and telecommunications will grow by more than six percent each year, soon reaching about:
a. $1 million
b. $2 million
c. $2 billion
d. $2 trillion

 

 

ANS:  D                    PTS:   1                    DIF:    2                    REF:   p. 184

OBJ:   8                    TOP:   cybercrime

 

  1. Which of the following is not a type of cybercrime?
a. Cybervandalism
b. Cybertheft
c. Cyberterrorism
d. Cyberfraud

 

 

ANS:  D                    PTS:   1                    DIF:    3                    REF:   p. 184

OBJ:   8                    TOP:   cybercrime

 

  1. Which of the following is not an example of computer fraud?
a. Theft of information
b. Salami fraud
c. Cybermovement
d. Corporate espionage

 

 

ANS:  C                    PTS:   1                    DIF:    1                    REF:   p. 184

OBJ:   8                    TOP:   cybercrime

 

  1. Which of the following is not a type of internet securities fraud?
a. Identity theft
b. Market manipulation
c. Fraudulent offerings of securities
d. Illegal touting

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 187

OBJ:   8                    TOP:   cybercrime

 

  1. _____ is the illegal acquisition of personal information such as bank passwords and credit card numbers by masquerading as a trustworthy person/business in what appears to be an official electronic communication.
a. Etailing fraud
b. Phishing
c. Cybertheft
d. Touting

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 188

OBJ:   8                    TOP:   cybercrime

 

  1. _____ is one type of malicious software program that disrupts or destroys existing programs and networks.
a. Computer worms
b. Computer virus
c. Trojan horse
d. Cyberbullying

 

 

ANS:  B                    PTS:   1                    DIF:    2                    REF:   p. 188

OBJ:   8                    TOP:   cybercrime

 

  1. Which of the following types of cybercrime was not discussed in the text?
a. Cyberterrorism
b. Phishing
c. Etailing
d. Chiseling

 

 

ANS:  D                    PTS:   1                    DIF:    1                    REF:   p. 188

OBJ:   8                    TOP:   cybervandalism

 

  1. Which type of cybervandalism appears as a benign application which actually contains codes that can damage the system operations?
a. Mydoom
b. Trojan horse
c. Malware
d. Chiseling

 

 

ANS:  B                    PTS:   1                    DIF:    2                    REF:   p. 188

OBJ:   8                    TOP:   cybervandalism

 

  1. In what type of cybercrime are small amounts of money subtracted from customers’ accounts and added to the account of the thief?
a. Phishing
b. Chiseling
c. Salami fraud
d. Trojan horse

 

 

ANS:  C                    PTS:   1                    DIF:    2                    REF:   p. 185

OBJ:   8                    TOP:   cybercrime

 

  1. _____ involves hacking secure computer networks at the enemy’s most sensitive military bases, defense contractors and aerospace companies in order to steal important data or to access their defenses.
a. Cyberterrorism
b. Cyberespionage
c. Cyberbullying
d. Cyberstalking

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 190

OBJ:   9                    TOP:   cybercrime

 

  1. Since 1995 the New York Electronic Crimes Task Force has charged over 1000 individuals with electronic crime losses exceeding _____.
a. $1 million
b. $10 million
c. $1 billion
d. $10 billion

 

 

ANS:  C                    PTS:   1                    DIF:    3                    REF:   p. 191

OBJ:   10                  TOP:   cybercrime

 

  1. _____ is the term used to describe efforts of organized groups to download and sell copyrighted software in violation of its license.
a. Warez
b. Denial of service attack
c. Market manipulation
d. Cybertheft

 

 

ANS:  A                    PTS:   1                    DIF:    1                    REF:   p. 187

OBJ:   8                    TOP:   cybercrime

 

  1. _____ is the term used to describe the illegal use of the internet to buy or sell merchandise online.
a. Cybertheft
b. Etailing fraud
c. Market manipulation
d. Denial of service attack

 

 

ANS:  B                    PTS:   1                    DIF:    1                    REF:   p. 188

OBJ:   8                    TOP:   cybercrime

 

  1. The United States Criminal Code provides penalties for a first time illegal copyright offender of _____ years incarceration and a fine of $250,000.
a. three
b. five
c. seven
d. ten

 

 

ANS:  B                    PTS:   1                    DIF:    2                    REF:   p. 191

OBJ:   10                  TOP:   cybercrime

 

  1. It is difficult to detect and control Internet pornography. Congress has struggled to create legislation that will restrict usage without violating _____ Amendment rights.
a. First
b. Fourth
c. Sixth
d. Eighth

 

 

ANS:  A                    PTS:   1                    DIF:    2                    REF:   p. 191

OBJ:   10                  TOP:   cybercrime

 

TRUE/FALSE

 

  1. The term terrorism first appeared during the Vietnam War.

 

ANS:  F                    PTS:   1                    DIF:    1                    REF:   p. 168

OBJ:   1                    TOP:   terrorism

 

  1. The view that terrorists suffer psychological abnormality is well accepted by those advocating the psychological view.

 

ANS:  T                    PTS:   1                    DIF:    2                    REF:   p. 189

OBJ:   3                    TOP:   who is the terrorist?

 

  1. Lack of economic opportunity and recessionary economies are positively correlated with terrorism.

 

ANS:  T                    PTS:   1                    DIF:    2                    REF:   p. 189-190

OBJ:   3                    TOP:   who is the terrorist?

 

  1. Death squads and the use of government troops to destroy political opposition parties are often associated with state-sponsored terrorism.

 

ANS:  T                    PTS:   1                    DIF:    3                    REF:   p. 171

OBJ:   4                    TOP:   the contemporary terrorist

 

  1. The Department of Homeland Security is responsible for securing our nation’s borders and transportation systems.

 

ANS:  T                    PTS:   1                    DIF:    1                    REF:   p. 173

OBJ:   5                    TOP:   Homeland Security

 

  1. The salami slice is a computer program secretly attached to a company’s computer system.

 

ANS:  F                    PTS:   1                    DIF:    2                    REF:   p. 185

OBJ:   8                    TOP:   cybercrime

 

  1. Cyberterrorism may result in a battered economy in which the government is forced to spend more on the military and cut back on social programs and education.

 

ANS:  T                    PTS:   1                    DIF:    2                    REF:   p. 189

OBJ:   9                    TOP:   cyberterrorism

 

  1. Since September 11, 2001, biometrics have been implemented in many facets of the security systems of the United States.

 

ANS:  T                    PTS:   1                    DIF:    1                    REF:   p. 190

OBJ:   10                  TOP:   cyberterrorism

 

  1. According to the United States Criminal Code, a first-time illegal copyright offender will be fined $250,000. A second time offender will receive five years incarceration.

 

ANS:  F                    PTS:   1                    DIF:    1                    REF:   p. 190

OBJ:   10                  TOP:   cybercrime

 

  1. There is some concern that the Child Online Protection Act controls free speech.

 

ANS:  T                    PTS:   1                    DIF:    3                    REF:   p. 191

OBJ:   10                  TOP:   cybercrime

 

COMPLETION

 

  1. ____________________ is illegal behavior that targets the security of computer systems and/or the data accessed and processed by computer networks.

 

ANS:  Cybercrime

 

PTS:   1                    DIF:    1                    REF:   p. 183             OBJ:   1

TOP:   cybercrime

 

  1. ____________________ is an attack against an enemy nation’s technological infrastructure.

 

ANS:  Cyberterrorism

 

PTS:   1                    DIF:    1                    REF:   p. 189             OBJ:   9

TOP:   cyberterrorism

 

  1. The ____________________ view of terrorism argues that if terrorists suffer psychological deficiencies it is because they have been poorly and improperly socialized.

 

ANS:  socialization

 

PTS:   1                    DIF:    1                    REF:   p. 169-170      OBJ:   3

TOP:   who is the terrorist?

 

  1. The Department of ____________________ performs analyses of foreign nuclear weapons.

 

ANS:  Energy

 

PTS:   1                    DIF:    2                    REF:   p. 173             OBJ:   5

TOP:   Homeland Security

 

  1. The ____________________ is the government official charged with coordinating data from the nation’s primary intelligence gathering agencies.

 

ANS:  Director of National Intelligence

 

PTS:   1                    DIF:    3                    REF:   p. 173             OBJ:   5

TOP:   Homeland Security

 

  1. On October 26, 2001, Congress passed the ____________________.

 

ANS:  U.S. Patriot Act

 

PTS:   1                    DIF:    1                    REF:   p. 178             OBJ:   7

TOP:   confronting terrorism with the law

 

  1. The USAPA expands all four traditional tools of surveillance: wiretaps, search warrants, pen/trap order, and ____________________.

 

ANS:  subpoenas

 

PTS:   1                    DIF:    3                    REF:   p. 178             OBJ:   7

TOP:   confronting terrorism with the law

 

  1. The ____________________ is a computer program that appears benign but which actually contains something harmful.

 

ANS:  Trojan horse

 

PTS:   1                    DIF:    2                    REF:   p. 188             OBJ:   8

TOP:   cybercrime

 

  1. ____________________ occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.

 

ANS:  Illegal touting

 

PTS:   1                    DIF:    2                    REF:   p. 187             OBJ:   8

TOP:   cybercrime

 

  1. ____________________ is slang for the processes used to acquire personal information used for identity theft and other fraudulent activities.

 

ANS:  Phishing

 

PTS:   1                    DIF:    2                    REF:   p. 188             OBJ:   8

TOP:   cybercrime

 

ESSAY

 

  1. Discuss the history of terrorism.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    1                    REF:   p. 168-169      OBJ:   2

TOP:   terrorism

 

  1. Compare and contrast two of the prevailing view on the motivation of terrorists.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 169-171      OBJ:   3

TOP:   who is the terrorist?

 

  1. Discuss the role of the Department of Homeland Security in the fight against terrorism.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 173-175      OBJ:   5

TOP:   Homeland Security

 

  1. Elaborate the types of contemporary terrorism using examples.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    3                    REF:   p. 171-173      OBJ:   4

TOP:   the contemporary terrorist

 

  1. Explain what state and county and local law enforcement are doing to deal with the threat of terrorism.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 175-178      OBJ:   6

TOP:   terrorism and law enforcement

 

  1. Discuss the purposes of the USA Patriot Act and then detail the concern about this Act by civil libertarians.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    3                    REF:   p. 178-179      OBJ:   7

TOP:   The USA Patriot Act

 

  1. Discuss three types of computer crimes using examples.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    2                    REF:   p. 183-188      OBJ:   8

TOP:   cybercrime

 

  1. Discuss the evolving role of law enforcement in fighting terrorism.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    3                    REF:   p. 173-178      OBJ:   5 | 6

TOP:   terrorism and law enforcement

 

  1. Some policy experts suggest that the way to fight terrorism is to use political solutions. Discuss several political solutions to fight against terrorism using Al’Qaeda as an example.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    3                    REF:   p. 179-182      OBJ:   5 | 6

TOP:   terrorism and the law

 

  1. Discuss some of the problems with enforcing cyber laws and recent initiatives to attempt to combat cybercrime.

 

ANS:

Answer not provided.

 

PTS:   1                    DIF:    3                    REF:   p. 190-192      OBJ:   10

TOP:   cybercrime

Additional information

Add Review

Your email address will not be published. Required fields are marked *